Policy components - a conceptual model for modularizing and tailoring of information security policies

被引:2
作者
Rostami, Elham [1 ]
Karlsson, Fredrik [1 ]
Gao, Shang [1 ]
机构
[1] Orebro Univ, Dept Informat, Orebro, Sweden
关键词
Information security policy; Information security management; Policy component; Situational method engineering; Policy design; DESIGN SCIENCE;
D O I
10.1108/ICS-10-2022-0160
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
PurposeThis paper aims to propose a conceptual model of policy components for software that supports modularizing and tailoring of information security policies (ISPs). Design/methodology/approachThis study used a design science research approach, drawing on design knowledge from the field of situational method engineering. The conceptual model was developed as a unified modeling language class diagram using existing ISPs from public agencies in Sweden. FindingsThis study's demonstration as proof of concept indicates that the conceptual model can be used to create free-standing modules that provide guidance about information security in relation to a specific work task and that these modules can be used across multiple tailored ISPs. Thus, the model can be considered as a step toward developing software to tailor ISPs. Research limitations/implicationsThe proposed conceptual model bears several short- and long-term implications for research. In the short term, the model can act as a foundation for developing software to design tailored ISPs. In the long term, having software that enables tailorable ISPs will allow researchers to do new types of studies, such as evaluating the software's effectiveness in the ISP development process. Practical implicationsPractitioners can use the model to develop software that assist information security managers in designing tailored ISPs. Such a tool can offer the opportunity for information security managers to design more purposeful ISPs. Originality/valueThe proposed model offers a detailed and well-elaborated starting point for developing software that supports modularizing and tailoring of ISPs.
引用
收藏
页码:331 / 352
页数:22
相关论文
共 50 条
  • [21] Main Considerations in Elaborating Organizational Information Security Policies
    Tagarev, Todor
    Polimirova, Dimitrina
    COMPUTER SYSTEMS AND TECHNOLOGIES, 2019, : 68 - 73
  • [22] Do Information Security Policies Reduce the Incidence of Security Breaches: An Exploratory Analysis
    Doherty, Neil
    Fulford, Heather
    INFORMATION RESOURCES MANAGEMENT JOURNAL, 2005, 18 (04) : 21 - 39
  • [23] CRITICAL CONSIDERATIONS FOR ORGANIZATION-SPECIFIC INFORMATION SECURITY POLICY DEVELOPMENT
    Kinnunen, Hanna
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON TRANSFORMATIONS AND INNOVATIONS IN MANAGEMENT (ICTIM 2017), 2017, 37 : 813 - 822
  • [24] Benchmarking Methodology for Information Security Policy (BMISP): Artifact Development and Evaluation
    Martin (Dae Youp) Kang
    Anat Hovav
    Information Systems Frontiers, 2020, 22 : 221 - 242
  • [25] Benchmarking Methodology for Information Security Policy (BMISP): Artifact Development and Evaluation
    Kang, Martin
    Hovav, Anat
    INFORMATION SYSTEMS FRONTIERS, 2020, 22 (01) : 221 - 242
  • [26] Using Galois Lattice to Represent and Analyze Information Security Policy Compliance
    Wang, Xiao-long
    Li, Wen-li
    PROCEEDINGS OF THE 5TH INTERNATIONAL ASIA CONFERENCE ON INDUSTRIAL ENGINEERING AND MANAGEMENT INNOVATION (IEMI2014), 2015, : 353 - 358
  • [27] Identifying linkages between statements in information security policy, procedures and controls
    Pathari, Vinod
    Sonar, Rajendra
    Information Management and Computer Security, 2012, 20 (04): : 264 - 280
  • [28] An integrative model of information security policy compliance with psychological contract: Examining a bilateral perspective
    Han, JinYoung
    Kim, Yoo Jung
    Kim, Hyungjin
    COMPUTERS & SECURITY, 2017, 66 : 52 - 65
  • [29] Automating Information Security Policy Compliance Checking
    Mandal, Debashis
    Mazumdar, Chandan
    PROCEEDINGS OF 2018 FIFTH INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT), 2018,
  • [30] Readability as a Basis for Information Security Policy Assessment
    Alkhurayyif, Yazeed
    Weir, George R. S.
    2017 SEVENTH INTERNATIONAL CONFERENCE ON EMERGING SECURITY TECHNOLOGIES (EST), 2017, : 113 - 120